Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
142s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 05:56
Static task
static1
Behavioral task
behavioral1
Sample
Google.html
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Google.html
Resource
win10v2004-20230915-en
General
-
Target
Google.html
-
Size
208KB
-
MD5
16fefe2d03dfb7615cc5f83c3fabd1a1
-
SHA1
de32813279975cea6e74346972a5bfe0248f0a02
-
SHA256
7913fbfa889e0169e19be6c2fc5bffaf7b0c06ae4f958f4d97c35a6f8768c986
-
SHA512
6afc7435a6eeb58a13679212d1e3717189d816178f87098d6ac77daad2b0d94a55fc24289e01114aa7bb4fd3aa6aa6debd6b0227e435210846be17cc14874596
-
SSDEEP
1536:oCHoL8tNOPqPmYQbe7+1A/hXBrL45Sdef6LHDM3psFiTkQHfVLNXhC+VphTZo5eu:opcWA/7nvkkQH9xVOXhK7LyB0lFzkQaH
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{2FCB3321-6804-11EE-8DC3-56C242017446} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "403169635" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000003916b9f19191c547a3cd833648cc0b6b0000000002000000000010660000000100002000000083f37026c2e228ec63ffdd2d88311d43cee914d3569b9cf9f624675404aa6f44000000000e8000000002000020000000c134e13f50b43b42de758a5702f7ded7441cd27322c1a15a817746a562d3db0a200000000fe7d57f82c8619f2a2b3b540dee79febd74a9567bb939f43547f699f34f89524000000021ff04f053baae2a60972ec282fb4ca61ee7586982f5e49d1a7c72e6c4fc6d9aeac85fc38335a4f686a57267fdf02c7bdc75d5a70d65e0a68540175e6aa591cf iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10eef50411fcd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-86725733-3001458681-3405935542-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1096 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1096 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1096 iexplore.exe 1096 iexplore.exe 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE 2580 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1096 wrote to memory of 2580 1096 iexplore.exe 28 PID 1096 wrote to memory of 2580 1096 iexplore.exe 28 PID 1096 wrote to memory of 2580 1096 iexplore.exe 28 PID 1096 wrote to memory of 2580 1096 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\Google.html1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1096 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2580
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5ba9abad1914af5189ba050cbc32ba0bf
SHA12669d1d0afbbbd37dbc81185c11484d79e03eb88
SHA256f218330c752fe52ec21609dff6fca9539500ad1ded2f24923fac5d99dfed8fc1
SHA5120c8202acd85cd891ec0e9fed1aef0d160e4ef65dbe2d6ba6226de462318e17ae243950a6ee80cbd7388b06455e2b5329e89fe20bfdf44ebf9a0ee2a58a48feb9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD522e5ac84886cafc06eb1dd231eede7ac
SHA1cc07403428698e43fea53b15b6115e7af56acc13
SHA25627d5a4b8e41902daa44de67c6482dfef6ce7ba141160310634d1158d897c04da
SHA5123d73ae6a83a639d4648f77171db66b719b9710952496caffaf34f2ec77620a1548fa51af4063d50bc2644e337bb577db210151cc77f8b6c6485ec3dcc8b05c56
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53546a2239f99f48b53eea03a310cfd46
SHA1f7ee7c334abb489a15cd68d989953cda0ea0ca3c
SHA256a8f88ebb63b418f25809aafc0714769c49a3485b0c54b9cca59faf3611cb8ae1
SHA5129e54807f4a049fbc5c3ffe14140e01858dc214bc6502f5ba6c02883045bf0491d1430bfb91983e3fd8f4e0ef9f89e11f6623fe9bf1db4b81fb1b8b368ecefd32
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56e807c61ff3aa17ec1b0a06e2ed4c4c7
SHA1f6744f8beb72799c6bde35813ab20efe64a06abc
SHA256aca4082864a84e0c417fc75b122e9b2aaeddc07628618711f557be499fa7a64c
SHA512563826accad43bb882ea24f25bc435a4e6287e8b60907154e495da91345c459b321ff5ebd89bfb8456bf857b8336c4b107bbc828fa7942d34d69c09ab07d14fe
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fa252aba23bfdeb641300368d7ae3c08
SHA1410c439fbe39c686311a560ba7d8bf26f09a27c2
SHA2562600004e0dfede7123892fdc121d706302557689fc7292e8b49fbdcb1ee68ca9
SHA512e7434e2ef204ed64df883c70ed363a7d5f6fc908b712cb610c8aaea62a46df1bbedd6750f0301b3f0112b9be99759e8c8d3899daaeaa195c2708efa1d6ebeb3d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57ee3fd53528821bfd4268e782604731a
SHA1f77c47110d94fd041761b45304961e2365e95607
SHA2561b471cae5b24dd1743190a6733c7bc56dc18e01d37a4971569f18b5f0eca8fd0
SHA5125653007f6655afbb4a59e2bc32e7d4a4763fecef97798c1ffa929b02bd96af6811a9ddd839334d337aa9892e953cabf5d9546e33106f5278adc92486c1317a83
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53b702e63adbb3176039c4712ece9dc26
SHA1f86e12580165e8345f55471ac72b2a862cf6ac15
SHA256b5a770ec0b42cdd2b5ac66dff5b9c087612f09bc5c2fdeefd39df560ef9cd2cd
SHA5122604ac17552d160a2bfd21479b656db8aba25039d4e0cb831b2f3d39a0ef97afe8e6336c454570c01d472926fc91c45dd432cff494490f83cd795b6acbff9be0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD53207f059ae0d8e94aa9410c918253c52
SHA1d0442ca0dd63371d739a932074be0ae66b0d4cad
SHA256999ba190165e103d4836825dbd261e52fbea2827936baa7fe99b8b49675aec1d
SHA512cfa9a19b126b2a02d0394e2c676df4169fec4315052ad2c0b635cfbd78c8ec4e4767f44f734ff720c274ff869f6ea8dcd42947b66437bfa7b60f65e2f4c5770d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5db2fe279dbf1c88aac9d014d9d6c6baa
SHA15e7240fb98a5f59c0a8697c616d0e260d3f6e1a1
SHA256577585cf3700093ce66119f9b320124c3e1c5ad969c8827a00fd57608f3bab4a
SHA51232c45304267f86bf5a3e22fedc54e6f9cf6f9edcd7741aa1621c34b8407189eb55f652cd166db8ad404fd0730a3c4bbff17a9d2678695eecadb0d6d2d1cfe8f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5f28662c1f63661a4e156834bc9d68193
SHA1ddadf183eb421f61b7d8dccc2f33d805ed994167
SHA256e91734cf306941c451081c016331a0ba81dabccc57f35aca0ad1db5cbdb3559c
SHA512ecbb01bde9ccf5c0279e222c1e60304590c7b23b35c19244f937432cf46583d2164f5f8286df875f078bb52711982c4a86793e29acc272148427a50f84ddb186
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD59dd24624293d78bfc7dd7596794b7e71
SHA120c577add8529c1072069e4597520b78aaf2c3b8
SHA256cb5edd3a02734dceea66c8b60cfc83f0dc6b1afbd83b217eb2aa6f8bf3a94b36
SHA512ff9e2265b1958a134c6073ffcf3271d62424788452971740b484d4d9e43678381a94c6272c76a501187a99b60bad14c45ddbafeb2fb0f6048478449a3f741fc1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b91bdf0acf92781425ef8e2d5a9213e4
SHA184506777f29b77d731475069df1654bfd8c57f9d
SHA256c9c796e6fcc6a4bd1c9d12152481bd435943c2825108102f7f486918561bd1ee
SHA512e9ae0b9efc3a0576c2c91736d9e2d92c2016bb07f8a91ca44bffc5c092d348c1a093c78bd1d2bb392c935b3f569ee6f4b9bf6f136ca8d5e505549845ec7004a7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5fe85683505b5a1e06b6fc264b4da00c9
SHA155afb87ff7b200a35fc95c7d17b3903ae08568ad
SHA256590b70482542f8da3111f6c79000af490a42cb820638d1d31573f704fb746e55
SHA512e997cb9b120dd78bc1c1eae904d168b80a6a854d359bd8ccbab8ceba358cc5412f506c302877b1d5c9d21692d888930b3dc65f52293fb124b8768fc16ddb2f65
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cf9d9688309340e36e614b16b5c5ea84
SHA1021964398fa61078f0e1a3bd410b4fdce4110369
SHA256932bbb7151f695045b0a325f43f40b6a67891341a91477a8d53a5a1487f9a9f9
SHA512eec08434b9a153572837558dfc1e08fc5bc7ac4183b89f9c853ab29a383c6553110d06f56fefcdd03ed3f1144ba3443bc860bb6a2afff4f9631acafc7065330d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5bf42b576f2de2d87d9cefc2d552a7304
SHA104f3e44ec4cb682b5a0a3e09adec0f91d34d0ceb
SHA2565312935d01197eecd61278688c7e68b802b16c5c8c5d7a41f5f87986f7f26777
SHA5123bf6ab7867de38296a6c316b935c8dea9e2609a1118c11de00daa271ec914bfe9f73c9bb22f4a0372c7446609382520ecd66e2cd8316ef9fe1caa93e0fc6ab2f
-
Filesize
61KB
MD5f3441b8572aae8801c04f3060b550443
SHA14ef0a35436125d6821831ef36c28ffaf196cda15
SHA2566720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf
SHA5125ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9
-
Filesize
163KB
MD59441737383d21192400eca82fda910ec
SHA1725e0d606a4fc9ba44aa8ffde65bed15e65367e4
SHA256bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5
SHA5127608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf